@@ -110,7 +110,7 @@ bool WebSocketValidateMessageSize(uint8_t *data, uint64_t obtainedNumBytes) {
110
110
uint64_t expectedNumBytes = WebSocketFullMessageSize (data, obtainedNumBytes);
111
111
112
112
if (expectedNumBytes != obtainedNumBytes) {
113
- printf (" Corrupt WebSocket message size! (got %llu bytes, expected %llu bytes)\n " , obtainedNumBytes, expectedNumBytes);
113
+ printf (" Corrupt WebSocket message size! (got %lu bytes, expected %lu bytes)\n " , obtainedNumBytes, expectedNumBytes);
114
114
printf (" Received data:" );
115
115
for (size_t i = 0 ; i < obtainedNumBytes; ++i)
116
116
printf (" %02X" , data[i]);
@@ -187,14 +187,14 @@ void DumpWebSocketMessage(uint8_t *data, uint64_t numBytes) {
187
187
uint64_t payloadLength = WebSocketMessagePayloadLength (data, numBytes);
188
188
uint8_t *payload = WebSocketMessageData (data, numBytes);
189
189
190
- printf (" Received: FIN: %d, opcode: %s, mask: 0x%08X, payload length: %llu bytes, unmasked payload:" , header->fin , WebSocketOpcodeToString (header->opcode ),
190
+ printf (" Received: FIN: %d, opcode: %s, mask: 0x%08X, payload length: %lu bytes, unmasked payload:" , header->fin , WebSocketOpcodeToString (header->opcode ),
191
191
WebSocketMessageMaskingKey (data, numBytes), payloadLength);
192
192
for (uint64_t i = 0 ; i < payloadLength; ++i) {
193
193
if (i%16 == 0 ) printf (" \n " );
194
194
if (i%8 ==0 ) printf (" " );
195
195
printf (" %02X" , payload[i]);
196
196
if (i >= 63 && payloadLength > 64 ) {
197
- printf (" \n ... (%llu more bytes)" , payloadLength-i);
197
+ printf (" \n ... (%lu more bytes)" , payloadLength-i);
198
198
break ;
199
199
}
200
200
}
0 commit comments